SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What do Print permission only allows?
1723
Use the Programs and Features Control Panel applet to
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
2. What is DHCP conflict detection?
Configure aging and scavenging.
The DHCP server will ping an ip address before assigning it.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
3. What do wireless access point need to be configured with to to preform 802.1x authentication?
They must be configured with the ip addresses of the radius server.
Create a customized shell
Install Windows Installer Packages (.MSI) files. You can script the installation.
To display friendly labels to capture packet address headers.
4. What is Oscdimg?
It is a network health policy defines the minumum level of client health required to connect to the network.
A .WFW file
Vista SP1 and Server 2008 and above.
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
5. How can non Microsoft PCs connect to print services?
WPA-Personal (uses a preshared key)
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
6. What is DiskPart?
A type of port forwarding that allows public network computers on a Private network through nat devises.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
They need to be configured us use 802.1x RADIUS authentication
7. What will a (.root) zone do in a DNS server?
Prevents the server from performing Internet name resolution.
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
4 (bits 49 - 52) /52 Allows for 16 regions.
It pings with IPV6
8. Can Offline migration be performed on Windows 2000?
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
It is the max size is expressed in megabytes.
WPA2 and 802.1x but require EAP-TLS to be enable.
No
9. What is exFAT?
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
IN the WindowsUpdateClient log in the system log portion of event viewer.
By either using WSUS management console (server side targeting) or GPO (client side targeting).
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
10. What can NAP do?
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Place unhealthy computers in a quarantined network and auto-remediate clients.
11. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
To another hard disk in the same computer - network or to removable media.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
12. You can still ___________ if root hints are disabled.
They must be configured with the ip addresses of the radius server.
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Forward to another DNS server
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
13. What are the proven - standards-based technologies that DirectAccess is built on?
By using the dnscmd /zoneexport command.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
A type of port forwarding that allows public network computers on a Private network through nat devises.
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
14. What protocol does Ping uses?
Set IE back to its default settings
The ICMP protocol.
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
EAP protocol.
15. Use ocsetup instead of servermanagercmd.exe _________.
Not supported
On a core server
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
16. Active directory DNS ____ replicate between forests.
Delete all the zone files or reinstall the DNS service.
Does not
Only sites added to the local Intranet Zones
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
17. What dows Windows Anytime Upgrade do?
Use IPV6 Unique Local Addresses.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Set IE back to its default settings
18. What does Windows uses the index for?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
They must be configured with the ip addresses of the radius server.
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
19. What does the Resource Monitor display?
Which processes currently consume a resource like processor utilization.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
L2TP/IPSEC with EAP-TLS.
dynamic drives
20. How can you restrict users to create sub-folders in a dfs root share?
Windows 7 Ultimate.
To another hard disk in the same computer - network or to removable media.
WINRM QUICKCONFIG.
Restrict the share permissions of the DFS root share.
21. What does Scanstate /GENMIGXML do?
Migrates EFS encrypted files?
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
It create a report of which files will be migrated
Drop both inbound and outbound traffic
22. What is Drvload?
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
DNS suffix search lists
Extensive Authentication Protocol used in PPP authentication.
Increase the SOA refresh interval parameter.
23. How do you create a subscription?
driveletter:\\WindowsImageBackup\
Using wecutil -cs in an xml file.
Internet printing protocol. Used for connecting to printers via web browser.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
24. What do you modify to define CD Autoplay settings and file associations?
DNS suffix search lists
To display friendly labels to capture packet address headers.
Default Programs Control Panel applet
Windows 7 Enterprise and Ultimate Editions
25. What does "wbdadmin -startrecovery -version" do?
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Divide up a large WIM file into multiple smaller .SWM files
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
26. What is a split tunnel VPN?
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
They are AAAA records.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Setup a GlobalNames zone.
27. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
vssadmin.exe. This can view previous version files as well.
They need to be configured us use 802.1x RADIUS authentication
28. What does Credential Manager allows you to store?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
29. What does Diskpart.exe do?
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
Yes
Can be used to create virtual hard disks
30. What requirements needs to be met to use network level authentication?
Enterprise Admins
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
4 (bits 53 - 56) /56 Allows for 16 regions
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
31. What is the Microsoft Application Compatibility Toolkit (ACT)?
Place unhealthy computers in a quarantined network and auto-remediate clients.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
32. How do you review files in the Offline Files Cache?
Configure a GPO to modify the computers location to look for updates.
Use SYNC Center
The ICMP protocol.
Windows XP and Server 2003.
33. What is the difference between MSCHAP2 and EAP-TLS?
On a core server
Run scripts
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
34. What does the WSUS DB Store?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Windows 7 Professional.
35. What must you do if DHCP is not installed on the same computer as the RADIUS server?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
The Application Identity Service
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
36. What is the command line version of windows server backup?
By using the dnscmd /zoneexport command.
wbadmin.exe. This can backup critical files.
Delegate permission by configuring the dacl of the zone file.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
37. How do you quickly restore a file from backup?
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Create persistent connections to computers with POWERSHELL
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
38. What service has to be started for Applocker to work?
The Application Identity Service
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
39. Where is ageing configured?
DHCPv6 obtains additional configuration settigns.
On the zone file of the DNS server in the DNS manager.
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
They are AAAA records.
40. How do you restore individual files?
Enforce IPSEC on the network
You can allow by adding the device vendor's GUID to the allow list in a GPO.
Either from wbadmin or windows server backup.
Use the net sh command to configure the proper ports for remote management.
41. You can configure ____________ in group policy.
It create a report of which files will be migrated
DNS suffix search lists
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
42. How do you move a Dynamic Disk from one computer to another?
Use the Import Foreign Disk option on the target computer
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Run scripts
A type of port forwarding that allows public network computers on a Private network through nat devises.
43. What does MISEXEC.EXE do?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Install Windows Installer Packages (.MSI) files. You can script the installation.
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
44. What are the minimum hardware requirements for Windows 7?
It is the max size is expressed in megabytes.
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
It pings with IPV6
1723
45. What does NETSH BRANCHCACHE FLUSH do?
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
Contains a list of dynamically updated list of authorities for the zone.
Clear the content being cached
Enterprise Admins
46. What does Windows ReadyBoost do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Where is the Troubleshoot option for fixing common problems located?
It pings with IPV6
DHCP server cannot assign an ip address
Devices and Printers Control Panel applet has a
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
48. What sites support Integrated Windows Authentication?
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
Only sites added to the local Intranet Zones
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
They are in the first 48 bits /48
49. What does the Windows 7 Upgrade Advisor do?
Modify/Create a GPO
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
50. What is Touch UI?
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
On a core server
Windows Aero was revised to be more touch-friendly.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.